Seminar onIntrusionDetectionSystem
Topics:Introduction of IDS
Technologies
Detection typesIntroductionWhat is IDS?
History
Need of IDS
Classification of IDSWhat is IDS?Revolution in networking
The possibilities and opportunities are limitless.
Unfortunately, so too are the risks and chances of malicious activities.Intrusion=Illegal entry or unwelcome addition
Definition:  Intrusion Detection System (IDS) is a software to determine if a computer network or server has experienced an unauthorized intrusion.
IDS detects these intrusion attempts so that action may be takento repair the damage later. IDS monitors network traffic and monitors for suspicious activity and alerts the system or network administrator.
The beginning(History)A USAF paper published in October 1972 written by James P. Anderson outlined the fact the USAF had “become increasingly aware of computer security problems.”
Before designing an IDS, it was necessary to understand the types of threats and attacks that could be mounted against computers systems.A computer system should provide confidentiality, integrity and assuranceagainst denial of service.
Confidentiality:Whether the information stored on a system is protected against unauthorized access.Need of IDS
Integrity:  Whether the information stored on a system is reliable and can be trusted.Increased connectivity: (especially on the Internet)   more and more systems are subject to attack by intruders.  
These intruders attempts try to exploit flaws in the OS as well as in application programs and have resulted in spectacular incidents.
Internet Worm incident of 1988.Two ways to handle
we cannot prevent intruders,we should at least try to detect it and prevent similar attacks in future.Types of intruders
Tasks to be performedSimulationAnalysisNotification
Technologies:
Network Intrusion detection systemDetect attacks as they happen
 Real-time monitoring of networks
 Provide information about attacks that have succeeded
 Forensic analysisDeploying sensors at strategic locations
E.G., Packet sniffing via tcpdump at routers
Inspecting network traffic
Watch for violations of protocols and unusual connection patterns
Monitoring user activities
Look into the data portions of the packets for malicious command sequences
May be easily defeated by encryptionData portions and some header information can be encryptedThe decryption engine still there.
Related Tools for Network IDS While not an element of Snort, Ethereal is the best open source GUI-based packet viewer

Intrusion Detection System(IDS)